Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Piccolo - MaRDI portal

Piccolo

From MaRDI portal
Software:25157



swMATH13242MaRDI QIDQ25157


No author found.





Related Items (55)

\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsWARP: revisiting GFN for lightweight 128-bit block cipherBiclique Cryptanalysis of Reduced-Round Piccolo Block CipherExtended meet-in-the-middle attacks on some Feistel constructionsDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsSecurity Analysis of the Lightweight Block Ciphers XTEA, LED and PiccoloAuthenticated Encryption: How Reordering Can Impact PerformanceAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreCHAM: a family of lightweight block ciphers for resource-constrained devicesMeet-in-the-Middle Attacks on Generic Feistel ConstructionsCryptanalysis of Reduced-Round SIMON32 and SIMON48Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded ApplicationsThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersImplementing Lightweight Block Ciphers on x86 ArchitecturesTowards the optimality of Feistel ciphers with substitution-permutation functionsBlockcipher-based authenticated encryption: how small can we go?The DBlock family of block ciphersA single-key attack on the full GOST block cipherBeyond birthday bound secure fresh rekeying: application to authenticated encryptionThe provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphersBitsliced Masking and ARM: Friends or Foes?A MAC Mode for Lightweight Block CiphersOptimizing S-Box Implementations for Several Criteria Using SAT SolversEspresso: a stream cipher for 5G wireless communication systemsDifferential Analysis of the LED Block CipherPRINCE – A Low-Latency Block Cipher for Pervasive Computing ApplicationsTowards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy ViewpointLightweight Cryptography for the Cloud: Exploit the Power of Bitslice ImplementationSlide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHITruncated differential based known-key attacks on round-reduced SIMONDifferential Cryptanalysis and Linear Distinguisher of Full-Round ZorroImproved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINECube Cryptanalysis of LBlock with Noisy LeakageComprehensive Study of Integral Analysis on 22-Round LBlockThe resistance of PRESENT-80 against related-key differential attacksTroika: a ternary cryptographic hash functionExploring Energy Efficiency of Lightweight Block CiphersProvable related-key security of contracting Feistel networksCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsPractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINUnnamed ItemA note on the signal-to-noise ratio of \((n, m)\)-functionsThe summation-truncation hybrid: reusing discarded bits for freeGeneric Key Recovery Attack on Feistel SchemeHashing Mode Using a Lightweight BlockcipherOn the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible DifferentialsA Search Strategy to Optimize the Affine Variant Properties of S-BoxesBiclique cryptanalysis on lightweight block cipher: HIGHT and PiccoloNew Impossible Differential Search Tool from Design and Cryptanalysis AspectsDouble-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several RoundsAutomatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers


This page was built for software: Piccolo